Palestine Action's Underground Manual: A Persistent Threat to Global Defense Infrastructure
Executive Summary
Despite the UK’s 2025 designation of Palestine Action as a terrorist organization, the group’s Underground Manual reveals a sophisticated, decentralized strategy for targeting defense infrastructure linked to Israel’s arms industry, posing ongoing risks to national security and corporate operations worldwide. The manual provides detailed instructions for forming covert cells, selecting targets, conducting reconnaissance, executing sabotage, and evading detection, with a global target map amplifying its reach.
Analysis
The Palestine Action Underground Manual is a 14-page guide designed to enable autonomous groups, or "cells," to conduct covert direct actions against entities involved in Israel’s weapons industry, such as Elbit Systems, Rafael, and Teledyne. Released by Unity of Fields, it emphasizes operational secrecy, digital security, and tactical creativity to maximize disruption while minimizing detection. Below is a detailed breakdown of its contents and implications:
Key Components of the Manual
Cell Formation (Step 1)
Cells are small (3-5 members or solo), autonomous groups operating under the Palestine Action Underground banner, ensuring security through limited membership and trusted relationships.
Cells use Protonmail for encrypted communication with Palestine Action, submitting action reports to receive further targets and guidance.
Target Selection (Step 2)
Britain: A target map (accessible via targetmap.org) lists 265+ global sites, including 8 Elbit Systems UK locations, 9 Rafael/Pearson Engineering sites, and others like Thales and Leonardo, linked to Israel’s military-industrial complex.
International: Instructions for researching local targets (e.g., Ministries of Defence or firms like Thales with ties to Elbit) using secure browsers like Tor and keywords such as “Elbit Systems” or “Rafael” alongside geographic locations.
Preparation and Reconnaissance (Step 3)
Emphasizes detailed reconnaissance (recces) to gather intelligence on parking, security, CCTV, police response times, and physical barriers (e.g., fences, barbed wire).
Advises blending in during recces (e.g., walking dogs in rural areas) and using Google Earth with Tor for initial site analysis, supplemented by in-person visits.
Action Planning (Step 4)
Suggested tactics include spray painting slogans (e.g., “Shut Elbit Down”), smashing windows/equipment, blocking pipes with concrete, and breaking into facilities.
Transportation strategies (foot, bike, car) prioritize avoiding CCTV and traceable payment methods (e.g., using cash for public transport).
Equipment (spray paint, sledgehammers) must be purchased with cash, and operatives must wear dark, baggy clothing, balaclavas, and plain shoes to avoid identification.
Recording actions via burner phones (with Lycamobile SIMs) and removing EXIF data ensures anonymity when submitting footage to Palestine Action.
Execution and Post-Action (Steps 5-6)
Actions are designed to be quick and impactful, with roles assigned for efficiency (e.g., one records, others act).
Post-action, all evidence (e.g., spray cans, attire) must be destroyed or stored off-site, and media is sent to actions@palestineaction.org for publication.
Digital Security (Steps 7-8)
Recommends Signal with burner numbers, Faraday cages for phones, Tor for research, and VPNs (ProtonVPN or Mullvad) to mask IP addresses.
CryptPad is suggested for secure document storage with expiry dates, and Protonmail is endorsed for encrypted communication, though cautioned for potential IP data sharing with authorities.
Security Implications
Decentralized Threat: The manual’s focus on small, autonomous cells makes detection and disruption challenging for law enforcement, as there’s no centralized command structure.
Global Reach: The target map’s 265+ sites across countries signal a scalable threat to defense contractors and government facilities worldwide, particularly those linked to Israel.
Operational Sophistication: Detailed guidance on reconnaissance, evasion, and digital security reflects a high level of tactical awareness, increasing the likelihood of successful actions.
Sources
Semper Incolumem: Details the UK’s proscription of Palestine Action and global reactions.
Unity of Fields Telegram: Source of the Underground Manual dissemination.
Target Map: Lists global targets linked to Israel’s arms industry.